Sciweavers

4469 search results - page 774 / 894
» Dynamic Program Slicing
Sort
View
ESA
2010
Springer
163views Algorithms» more  ESA 2010»
14 years 11 months ago
On the Huffman and Alphabetic Tree Problem with General Cost Functions
We study a wide generalization of two classical problems, the Huffman Tree and Alphabetic Tree Problem. We assume that the cost caused by the ith leaf is fi(di), where di is its d...
Hiroshi Fujiwara, Tobias Jacobs
EUROPAR
2010
Springer
14 years 11 months ago
Thread Owned Block Cache: Managing Latency in Many-Core Architecture
Abstract. Shared last level cache is crucial to performance. However, multithread program model incurs serious contention in shared cache. In this paper, to reduce average cache ac...
Fenglong Song, Zhiyong Liu, Dongrui Fan, Hao Zhang...
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
14 years 11 months ago
Multiobjective robustness for portfolio optimization in volatile environments
Multiobjective methods are ideal for evolving a set of portfolio optimisation solutions that span a range from highreturn/high-risk to low-return/low-risk, and an investor can cho...
Ghada Hassan, Christopher D. Clack
DATE
2010
IEEE
142views Hardware» more  DATE 2010»
14 years 10 months ago
Transition-aware real-time task scheduling for reconfigurable embedded systems
—Due to increase in demand for reconfigurability in embedded systems, real-time task scheduling is challenged by non-negligible reconfiguration overheads. If such overheads are n...
Hessam Kooti, Elaheh Bozorgzadeh, Shenghui Liao, L...
CCS
2010
ACM
14 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...